of property, today if somebody steals your data and takes it to another machine, the bad guys machine, and you have full proof, you have logs that that activity has taken place, you are not authorized to go into that machine and to take your data back. >> reporter: banks bundle money with exploding dye packs, making it easier for police to identify robbers. after the russians invaded and unleashed a cyber attack against georgia in 2008 the georgian government counter attacked with the equivalent of a cyber dye pack. >> they knew an adversary was on a particular machine, and they placed a document that was titled, georgia nato negotiations, a word document on that machine, it was immediately taken by the bad guy. and when they opened it up on their machine, it beaconed back to the georgians, they activated the web cam, they took his picture and they published that information for everyone to see. >> reporter: alperovitch says this type of cyber counter espionage is an effective way for american companies to find who is stealing their material. effective maybe, but currently illegal.